Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.137.248.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24367
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.137.248.159.			IN	A

;; AUTHORITY SECTION:
.			551	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101402 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 15 04:06:11 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 159.248.137.66.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.248.137.66.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.144.3.140 attack
51.144.3.140 - - [03/Aug/2020:06:22:55 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.144.3.140 - - [03/Aug/2020:06:22:56 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.144.3.140 - - [03/Aug/2020:06:22:57 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-03 12:50:58
65.151.160.89 attackbots
Aug  3 09:08:54 our-server-hostname sshd[17930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.151.160.89  user=r.r
Aug  3 09:08:56 our-server-hostname sshd[17930]: Failed password for r.r from 65.151.160.89 port 60606 ssh2
Aug  3 12:12:45 our-server-hostname sshd[5895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.151.160.89  user=r.r
Aug  3 12:12:47 our-server-hostname sshd[5895]: Failed password for r.r from 65.151.160.89 port 43770 ssh2
Aug  3 12:24:10 our-server-hostname sshd[8285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.151.160.89  user=r.r
Aug  3 12:24:13 our-server-hostname sshd[8285]: Failed password for r.r from 65.151.160.89 port 60278 ssh2
Aug  3 12:28:00 our-server-hostname sshd[9718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.151.160.89  user=r.r
Aug  3 12:28:03 our-s........
-------------------------------
2020-08-03 12:46:26
190.12.66.27 attack
Aug  2 23:45:21 mx sshd[28508]: Failed password for root from 190.12.66.27 port 59872 ssh2
2020-08-03 12:57:40
89.22.180.208 attackspam
Aug  3 04:37:24 rush sshd[22951]: Failed password for root from 89.22.180.208 port 57184 ssh2
Aug  3 04:41:37 rush sshd[23087]: Failed password for root from 89.22.180.208 port 39066 ssh2
...
2020-08-03 12:53:44
164.132.225.250 attackbotsspam
2020-08-03T05:42:01.856282mail.broermann.family sshd[16176]: Failed password for root from 164.132.225.250 port 47686 ssh2
2020-08-03T05:49:30.275993mail.broermann.family sshd[16435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=250.ip-164-132-225.eu  user=root
2020-08-03T05:49:32.902368mail.broermann.family sshd[16435]: Failed password for root from 164.132.225.250 port 57608 ssh2
2020-08-03T05:56:50.547417mail.broermann.family sshd[16649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=250.ip-164-132-225.eu  user=root
2020-08-03T05:56:52.576541mail.broermann.family sshd[16649]: Failed password for root from 164.132.225.250 port 39300 ssh2
...
2020-08-03 13:02:35
46.161.27.75 attackspam
firewall-block, port(s): 7373/tcp, 9992/tcp
2020-08-03 12:58:17
217.182.79.176 attackspam
frenzy
2020-08-03 12:48:49
123.206.255.181 attackspam
2020-08-02T21:57:07.159107linuxbox-skyline sshd[42449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.255.181  user=root
2020-08-02T21:57:09.523249linuxbox-skyline sshd[42449]: Failed password for root from 123.206.255.181 port 45468 ssh2
...
2020-08-03 12:45:54
45.143.223.152 attackspam
Port Scan
...
2020-08-03 12:56:59
49.235.66.32 attackbots
2020-08-03T03:47:15.829299abusebot-5.cloudsearch.cf sshd[19390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.66.32  user=root
2020-08-03T03:47:17.922782abusebot-5.cloudsearch.cf sshd[19390]: Failed password for root from 49.235.66.32 port 33652 ssh2
2020-08-03T03:50:30.957282abusebot-5.cloudsearch.cf sshd[19420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.66.32  user=root
2020-08-03T03:50:32.819903abusebot-5.cloudsearch.cf sshd[19420]: Failed password for root from 49.235.66.32 port 39400 ssh2
2020-08-03T03:53:50.378832abusebot-5.cloudsearch.cf sshd[19471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.66.32  user=root
2020-08-03T03:53:52.030580abusebot-5.cloudsearch.cf sshd[19471]: Failed password for root from 49.235.66.32 port 45148 ssh2
2020-08-03T03:57:09.813130abusebot-5.cloudsearch.cf sshd[19508]: pam_unix(sshd:auth): authenticat
...
2020-08-03 12:44:42
211.104.171.239 attack
Failed password for root from 211.104.171.239 port 33320 ssh2
2020-08-03 13:18:39
89.107.39.61 attack
Automatic report - Port Scan Attack
2020-08-03 13:22:31
218.92.0.192 attackspam
08/03/2020-01:06:26.941214 218.92.0.192 Protocol: 6 ET SCAN Potential SSH Scan
2020-08-03 13:07:13
14.252.204.234 attackspam
1596426999 - 08/03/2020 05:56:39 Host: 14.252.204.234/14.252.204.234 Port: 445 TCP Blocked
2020-08-03 13:16:33
207.148.107.204 attackbotsspam
Brute forcing email accounts
2020-08-03 13:25:57

Recently Reported IPs

107.213.93.118 149.241.83.189 185.242.109.50 3.224.81.208
181.80.235.237 160.80.184.37 67.232.206.235 177.134.219.10
94.96.130.85 32.1.180.64 68.116.44.119 128.186.141.106
32.94.83.138 92.84.247.64 195.113.81.161 152.124.197.251
187.162.245.176 212.198.210.82 130.111.105.252 123.221.131.64